Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco
News

ArcaneDoor Threat Actor Resurfaces in Continued Attacks Against Cisco

Team-CWDBy Team-CWDSeptember 26, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified cyber-attack campaign has exploited Cisco Adaptive Security Appliance (ASA) devices in a sophisticated operation linked to the espionage-focused ArcaneDoor threat actor.

The attacks targeted certain Cisco ASA 5500-X Series devices that were running Cisco Secure Firewall ASA Software with VPN web services enabled.

Cisco has assessed with high confidence that this new activity is related to the same threat actor as the ArcaneDoor attack campaign that Cisco reported in early 2024.

ArcaneDoor has been linked to espionage-focused campaigns targeting perimeter network devices as intrusion points.

The aim of the latest attack campaign was to implant malware, execute commands and potentially exfiltrate data from the compromised devices.

This conclusion comes following an investigation by the global network infrastructure vendor which began after multiple government agencies engaged the firm in May 2025.

Cisco said attackers were observed to have exploited multiple zero-day vulnerabilities and employed advanced evasion techniques, such as disabling logging, intercepting command line interface (CLI) commands and intentionally crashing devices to prevent diagnostic analysis. 

The evidence collected during the investigation strongly indicates that CVE-2025-20333 (CVSS 9.9) and CVE-2025-20362 (CVSS 6.5) were used by the attacker in the current attack campaign.

The company also noted that during the analysis of compromised devices it observed the threat actor modifying ROM Monitor (ROMMON) to allow for persistence across reboots and software upgrades.

These modifications have been observed only on Cisco ASA 5500-X Series platforms that were released prior to the development of Secure Boot and Trust Anchor technologies, Cisco said.

“No CVE will be assigned to the lack of Secure Boot and Trust Anchor technology support on these platforms. Cisco has not observed successful compromise, malware implantation, or the existence of a persistence mechanism on platforms that support Secure Boot and Trust Anchors,” the company added in its update.

Cisco ASA Models Successfully Compromised

In its evaluation, Cisco identified a number of ASA 5500-X Series models that are running Cisco ASA Software releases 9.12 or 9.14 with VPN web services enabled had been observed to be successfully compromised in the ArcaneDoor campaign.

These models do not support Secure Boot and Trust Anchor technologies. They are:

  • 5512-X and 5515-X – Last Date of Support: August 31, 2022
  • 5525-X, 5545-X, and 5555-X – Last Date of Support: September 30, 2025
  • 5585-X – Last Date of Support: May 31, 2023

The following Cisco ASA 5500-X Series models, as well as all Cisco Firepower and Cisco Secure Firewall models, support Secure Boot and Trust Anchors:

  • 5505-X, 5506H-X, 5506W-X, 5508-X, and 5516-X – Last Date of Support: August 31, 2026

The company noted that while no successful exploitation of these vulnerabilities and no modifications of ROMMON have been observed on these models, they are included in the report due to the impending end of support.

Organizations Urged to Remediate

This latest campaign is another example of state-sponsored actors targeting perimeter network. As a critical path for data into and out of the network, such devices need to be routinely and promptly patched.

Commenting on the latest update from Cisco, the UK’s National Cyber Security Center’s CTO, Ollie Whitehouse, said: “It is critical for organizations to take note of the recommended actions highlighted by Cisco today, particularly on detection and remediation. We strongly encourage network defenders to follow vendor best practices and engage with the NCSC’s malware analysis report to assist with their investigations.”

Cisco has provided detailed guidance on remediation efforts companies can take. Customers are advised to upgrade to an appropriate fixed software release which the firm lists in its guidance.

Remediation recommendations include customers upgrading to a fixed release to resolve the vulnerabilities and prevent subsequent exploitation. Cisco considers this a long-term solution.

A temporary solution to the vulnerabilities is to disable all SSL/TLS-based VPN web services. This includes disabling IKEv2 client services that facilitate the update of client endpoint software and profiles as well as disabling all SSL VPN services.

In cases of suspected or confirmed compromise on any Cisco firewall device, all configuration elements of the device should be considered untrusted, the company outlined. 

Whitehouse commented, “End-of-life technology presents a significant risk for organizations. Systems and devices should be promptly migrated to modern versions to address vulnerabilities and strengthen resilience.”  

To assist with detection of the activity and mitigation, the NCSC has also issued a joint advisory with international partners and published two reports which share detailed analysis of malware, dubbed Line Dancer and Line Runner, related to the malicious activity.

The US Cybersecurity and Infrastructure Security Agency (CISA) also issued an Emergency Directive which listed required actions which apply to agency assets in any federal information system.

CISA is directing agencies to account for all Cisco ASA and Firepower devices, collect forensics and assess compromise via CISA-provided procedures and tools, disconnect end-of-support devices and upgrade devices that will remain in service.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
Next Article It’s all fun and games until someone gets hacked
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

AI-powered financial scams swamp social media

September 11, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.